EN
ENNA

angr vs ILSpy

GitHub Stats

8.6k
Stars
24.9k
1.2k
Forks
3.6k
604
Issues
225
3d ago
Updated
3d ago
BSD-2-Clause
License
MIT
Python
Language
C#

About angr

angr is a platform-agnostic binary analysis framework developed at UC Santa Barbara's Seclab. It combines both static and dynamic symbolic (concolic) analysis, providing a powerful Python API for analyzing compiled binaries without source code. angr can automatically explore execution paths through a binary, solve for inputs that reach specific code locations, recover control flow graphs, perform taint analysis, and identify vulnerabilities like buffer overflows and format string bugs. Its architecture is modular - SimOS provides OS abstraction, SimEngine handles execution, and the exploration strategies (DFS, BFS, coverage-optimized) guide analysis through the program state space. angr is widely used in academic research and CTF competitions, and forms the backbone of several automated vulnerability discovery tools.

About ILSpy

ILSpy is the open-source .NET assembly browser and decompiler. It supports decompilation of .NET assemblies to C# with high-quality output, including support for modern C# features like async/await, LINQ, and pattern matching. ILSpy can decompile entire assemblies or individual types and members, with the ability to search across loaded assemblies and navigate type hierarchies. It supports .NET Framework, .NET Core, .NET 5+, and Mono assemblies. Unlike dnSpy, ILSpy focuses purely on decompilation and browsing rather than debugging and editing, making it lighter and more focused. It's available as a standalone Windows application, a VS Code extension, and a command-line tool (ilspycmd) for cross-platform use. ILSpy is actively maintained and is the most widely used open-source .NET decompiler.

Platform Support

๐Ÿงlinux๐ŸŽmacos๐ŸชŸwindows
๐ŸชŸwindows๐Ÿงlinux๐ŸŽmacos

Tags

angr only

symbolic-executionbinary-analysiscfrvulnerability-discoveryconcolicctf

ILSpy only

dotnetdecompilerassembly-browsercross-platformcsharp